| Home | Free Articles for Your Site | Submit an Article | Advertise | Link to Us | Search | Contact Us |
This site is an archive of old articles

    SEARCH ARTICLES


vertical line

Article Surfing Archive


Unsecured Instant Messaging - Are You Leaving The Backdoor Unlocked? - Articles Surfing

By now almost everyone has heard of Instant Messaging or IM. Depending on your generation, you either are an avid user or your children use it. What started out as a social networking tool for adolescents on the home computer is now gaining recognition in the office environment as an alternative communication tool. Do you know all of the capabilities and risks of this casual tool?

Instant Messaging use has merit -

it is quick, direct and conversational - like a phone conversation, yet you can still multi-process

it supports group talk - several people in one conversation or session accounts and

usage is typically free via the major providers - MSN, Yahoo, AOL

Since it is often not formally implemented by the company as a work tool, it is considered personal and lacks oversight. Many employers do not even have a written usage policy. IT views it as one less area to monitor and support. Here is where the problems can begin.

Two factors every employer needs to consider if you opt to ignore IM in your workplace -

With the recent Supreme Court clarification on e-discovery rules, responsibility and accountability for workplace behavior lies with the employer. Any digital data stream that occurs on a company asset (i.e. workstation, laptop) is subject to review and retrieval upon request. The history span covered is usually three to seven years, depending on your industry's compliance initiatives (i.e. SOX, HIPPA, NASD, etc.). An employer needs to show reasonable efforts to manage the entire corporate network. A company also needs capability to produce specified content reports and dialogues on requested employee(s) over a given time period. Typically the courts allow up to thirty days to comply. Failure to deliver has shown favor to the plaintiff in recent cases and in some rulings, punitive fines for non-delivery were rendered as well. That's the legal consequence and can be a daunting enough reason to take measures for controlling IM.

IM technology has become more versatile, and is continuing to evolve. You can still chat with your friends as originally designed. However, did you know you can also play interactive games, gamble, watch videos, draw on whiteboards, video chat or transfer files of all sizes. All of this activity is outside the network's scrutiny - 'under the radar' - with no record of activity. This is becoming a preferred way of passing along new viruses, malware and worms.

Conclusion

Left unchecked, at minimum it can cost you productivity and bandwidth. It also can become a conduit for losing Intellectual Property, attracting viruses, sexual harassment, litigation or more. Your company could be in line for a PR nightmare and costly litigation.

A common reaction for a company is to 'shut it down and do not allow any IM'. Are you sure that is effective? We had a large prospect that was absolutely positive no personal IM took place on their corporate network due to controls they put in place. They allowed us to monitor (look only) at their network environment for one week with our systems. We counted 1.6 million unsanctioned messages that crossed their network - unchecked or tracked.

Instant Messaging is not coming - it's here. The laws now say we need to manage the technology the same as we do for email.

Enclave Data Solutions works with companies to assure their data and messaging is in compliance and secure. Our solutions are state of the art, quick to implement, cost effective and provide the comfort to know your data is secure. A phone discussion is a great way to assess your environment and what would be the best action plan. Visit our website Enclave Data (www.enclavedata.com) to learn more.

You have the responsibility to maintain your company's digital environment, with the right tools you can now also have the control to assure compliance and protect your company's assets.

Submitted by:

Dan Schutte

Dan Schutte is the President of Enclave Data Solutions, specializing in messaging security, content filtering, anti-spam software, email/IM archival and compliance. Visit http://www.enclavedata.com to read actual Case Studies of how companies have successfully protected their data networks and messaging.


        RELATED SITES



https://articlesurfing.org/computers_and_technology/unsecured_instant_messaging_are_you_leaving_the_backdoor_unlocked.html

Copyright © 1995 - 2024 Photius Coutsoukis (All Rights Reserved).

ARTICLE CATEGORIES

Aging
Arts and Crafts
Auto and Trucks
Automotive
Business
Business and Finance
Cancer Survival
Career
Classifieds
Computers and Internet
Computers and Technology
Cooking
Culture
Education
Education #2
Entertainment
Etiquette
Family
Finances
Food and Drink
Food and Drink B
Gadgets and Gizmos
Gardening
Health
Hobbies
Home Improvement
Home Management
Humor
Internet
Jobs
Kids and Teens
Learning Languages
Leadership
Legal
Legal B
Marketing
Marketing B
Medical Business
Medicines and Remedies
Music and Movies
Online Business
Opinions
Parenting
Parenting B
Pets
Pets and Animals
Poetry
Politics
Politics and Government
Real Estate
Recreation
Recreation and Sports
Science
Self Help
Self Improvement
Short Stories
Site Promotion
Society
Sports
Travel and Leisure
Travel Part B
Web Development
Wellness, Fitness and Diet
World Affairs
Writing
Writing B